Search results for: accessible systems
9379 Open Data for e-Governance: Case Study of Bangladesh
Authors: Sami Kabir, Sadek Hossain Khoka
Abstract:
Open Government Data (OGD) refers to all data produced by government which are accessible in reusable way by common people with access to Internet and at free of cost. In line with “Digital Bangladesh” vision of Bangladesh government, the concept of open data has been gaining momentum in the country. Opening all government data in digital and customizable format from single platform can enhance e-governance which will make government more transparent to the people. This paper presents a well-in-progress case study on OGD portal by Bangladesh Government in order to link decentralized data. The initiative is intended to facilitate e-service towards citizens through this one-stop web portal. The paper further discusses ways of collecting data in digital format from relevant agencies with a view to making it publicly available through this single point of access. Further, possible layout of this web portal is presented.Keywords: e-governance, one-stop web portal, open government data, reusable data, web of data
Procedia PDF Downloads 3559378 The Doctrine of Military Necessity under Customary International Law: A Breach of International Humanitarian Law
Authors: Uche A. Nnawulezi
Abstract:
This paper examines an essential and complex part of International humanitarian law standards of military necessity. Military necessity is an unpredictable phenomenon. The unpredictability of this regulation likewise originates from the fact that is one of the most fundamental, yet most misjudged and distorted standards of international law of armed conflict. This rule has been censured as essentially wrong in light of its non-compliance with the principles of international humanitarian law in recent past. The author noted in this study that military necessity runs counter to humanitarian exigencies. These have generated debate among researchers for them to propose that for international law to be considered more important, it is indispensable that the procedures and substance of custom be illuminated and made accessible to every one of the individuals who may utilize it or be influenced by it. However, a significant number of analysts have attributed particular weaknesses to this doctrine. This study relied on both primary and secondary sources of data collection. Significantly, the recommendation made in this paper, if completely adopted, shall go a long way in guaranteeing a better application of the principles of international humanitarian law.Keywords: military necessity, international law, international humanitarian law, customary law
Procedia PDF Downloads 2159377 A Query Optimization Strategy for Autonomous Distributed Database Systems
Authors: Dina K. Badawy, Dina M. Ibrahim, Alsayed A. Sallam
Abstract:
Distributed database is a collection of logically related databases that cooperate in a transparent manner. Query processing uses a communication network for transmitting data between sites. It refers to one of the challenges in the database world. The development of sophisticated query optimization technology is the reason for the commercial success of database systems, which complexity and cost increase with increasing number of relations in the query. Mariposa, query trading and query trading with processing task-trading strategies developed for autonomous distributed database systems, but they cause high optimization cost because of involvement of all nodes in generating an optimal plan. In this paper, we proposed a modification on the autonomous strategy K-QTPT that make the seller’s nodes with the lowest cost have gradually high priorities to reduce the optimization time. We implement our proposed strategy and present the results and analysis based on those results.Keywords: autonomous strategies, distributed database systems, high priority, query optimization
Procedia PDF Downloads 5239376 Knowledge Engineering Based Smart Healthcare Solution
Authors: Rhaed Khiati, Muhammad Hanif
Abstract:
In the past decade, smart healthcare systems have been on an ascendant drift, especially with the evolution of hospitals and their increasing reliance on bioinformatics and software specializing in healthcare. Doctors have become reliant on technology more than ever, something that in the past would have been looked down upon, as technology has become imperative in reducing overall costs and improving the quality of patient care. With patient-doctor interactions becoming more necessary and more complicated than ever, systems must be developed while taking into account costs, patient comfort, and patient data, among other things. In this work, we proposed a smart hospital bed, which mixes the complexity and big data usage of traditional healthcare systems with the comfort found in soft beds while taking certain concerns like data confidentiality, security, and maintaining SLA agreements, etc. into account. This research work potentially provides users, namely patients and doctors, with a seamless interaction with to their respective nurses, as well as faster access to up-to-date personal data, including prescriptions and severity of the condition in contrast to the previous research in the area where there is lack of consideration of such provisions.Keywords: big data, smart healthcare, distributed systems, bioinformatics
Procedia PDF Downloads 1989375 An Evaluation Model for Enhancing Flexibility in Production Systems through Additive Manufacturing
Authors: Angela Luft, Sebastian Bremen, Nicolae Balc
Abstract:
Additive manufacturing processes have entered large parts of the industry and their range of application have progressed and grown significantly in the course of time. A major advantage of additive manufacturing is the innate flexibility of the machines. This corelates with the ongoing demand of creating highly flexible production environments. However, the potential of additive manufacturing technologies to enhance the flexibility of production systems has not yet been truly considered and quantified in a systematic way. In order to determine the potential of additive manufacturing technologies with regards to the strategic flexibility design in production systems, an integrated evaluation model has been developed, that allows for the simultaneous consideration of both conventional as well as additive production resources. With the described model, an operational scope of action can be identified and quantified in terms of mix and volume flexibility, process complexity, and machine capacity that goes beyond the current cost-oriented approaches and offers a much broader and more holistic view on the potential of additive manufacturing. A respective evaluation model is presented this paper.Keywords: additive manufacturing, capacity planning, production systems, strategic production planning, flexibility enhancement
Procedia PDF Downloads 1579374 Development of Typical Meteorological Year for Passive Cooling Applications Using World Weather Data
Authors: Nasser A. Al-Azri
Abstract:
The effectiveness of passive cooling techniques is assessed based on bioclimatic charts that require the typical meteorological year (TMY) for a specified location for their development. However, TMYs are not always available; mainly due to the scarcity of records of solar radiation which is an essential component used in developing common TMYs intended for general uses. Since solar radiation is not required in the development of the bioclimatic chart, this work suggests developing TMYs based solely on the relevant parameters. This approach improves the accuracy of the developed TMY since only the relevant parameters are considered and it also makes the development of the TMY more accessible since solar radiation data are not used. The presented paper will also discuss the development of the TMY from the raw data available at the NOAA-NCDC archive of world weather data and the construction of the bioclimatic charts for some randomly selected locations around the world.Keywords: bioclimatic charts, passive cooling, TMY, weather data
Procedia PDF Downloads 2409373 The Economic Implications of Cryptocurrency and Its Potential to Disrupt Traditional Financial Systems as a Store of Value
Authors: G. L. Rithika, Arvind B. S., Akash R., Ananda Vinayak, Hema M. S.
Abstract:
Cryptocurrencies were first launched in the year 2009 and have been a great asset to own. Cryptocurrencies are a representation of a completely distinct decentralization model for money. They also contribute to the elimination of currency monopolies and the liberation of money from control. The fact that no government agency can determine a coin's value or flow is what cryptocurrency advocates believe makes them safe and secure. The aim of this paper is to analyze the economic implications of cryptocurrency and how it would disrupt traditional financial systems. This paper analyses the growth of Cryptocurrency over the years and the potential threats of cryptocurrency to financial systems. Our analysis shows that although the DeFi design, like the traditional financial system, may have the ability to lower transaction costs, there are multiple layers where rents might build up because of endogenous competition limitations. The permissionless and anonymous design of DeFi poses issues for ensuring tax compliance, anti-money laundering laws and regulations, and preventing financial misconduct.Keywords: cryptocurrencies, bitcoin, blockchain technology, traditional financial systems, decentralisation, regulatory framework
Procedia PDF Downloads 499372 Experimental Investigation of Cold-Formed Steel-Timber Board Composite Floor Systems
Authors: Samar Raffoul, Martin Heywood, Dimitrios Moutaftsis, Michael Rowell
Abstract:
This paper comprises an experimental investigation into the structural performance of cold formed steel (CFS) and timber board composite floor systems. The tests include a series of small-scale pushout tests and full-scale bending tests carried out using a refined loading system to simulate uniformly distributed constant load. The influence of connection details (screw spacing and adhesives) on floor performance was investigated. The results are then compared to predictions from relevant existing models for composite floor systems. The results of this research demonstrate the significant benefits of considering the composite action of the boards in floor design. Depending on connection detail, an increase in flexural stiffness of up to 40% was observed in the floor system, when compared to designing joists individually.Keywords: cold formed steel joists, composite action, flooring systems, shear connection
Procedia PDF Downloads 1299371 Epistemic Uncertainty Analysis of Queue with Vacations
Authors: Baya Takhedmit, Karim Abbas, Sofiane Ouazine
Abstract:
The vacations queues are often employed to model many real situations such as computer systems, communication networks, manufacturing and production systems, transportation systems and so forth. These queueing models are solved at fixed parameters values. However, the parameter values themselves are determined from a finite number of observations and hence have uncertainty associated with them (epistemic uncertainty). In this paper, we consider the M/G/1/N queue with server vacation and exhaustive discipline where we assume that the vacation parameter values have uncertainty. We use the Taylor series expansions approach to estimate the expectation and variance of model output, due to epistemic uncertainties in the model input parameters.Keywords: epistemic uncertainty, M/G/1/N queue with vacations, non-parametric sensitivity analysis, Taylor series expansion
Procedia PDF Downloads 4339370 National Strategy for Swedish Wildlife Management
Authors: Maria Hornell, Marcus Ohman
Abstract:
Nature, and the society it is a part of, is under constant change. The landscape, climate and game populations vary over time, as well as society's priorities and the way it uses the land where wildlife may proliferate. Sweden currently has historically large wildlife populations which are a resource for the benefit and joy of many people. Wildlife may also be seen as a problem as it may cause damage in contradiction to other human interests. The Swedish Environmental Protection Agency introduces a new long-term strategy for national wildlife management. The strategy envisions a wildlife management in balance. It focuses on wildlife values in a broad sense including outdoor recreation and tourism as well as conservation of biodiversity. It is fundamental that these values should be open and accessible for the major part of the population. For that to be possible new ways to manage, mitigate and prevent damages and other problems that wildlife causes need to be developed. The strategy describes a roadmap for the development and strengthening of Sweden's wildlife management until 2020. It aims at being applicable for those authorities and stakeholders with interest in wildlife management being a guide for their own strategies, goals, and activities.Keywords: wildlife management, strategy, Sweden, SEPA
Procedia PDF Downloads 2179369 Intrusion Detection System Based on Peer to Peer
Authors: Alireza Pour Ebrahimi, Vahid Abasi
Abstract:
Recently by the extension of internet usage, Research on the intrusion detection system takes a significant importance. Many of improvement systems prevent internal and external network attacks by providing security through firewalls and antivirus. In recently years, intrusion detection systems gradually turn from host-based systems and depend on O.S to the distributed systems which are running on multiple O.S. In this work, by considering the diversity of computer networks whit respect to structure, architecture, resource, services, users and also security goals requirement a fully distributed collaborative intrusion detection system based on peer to peer architecture is suggested. in this platform each partner device (matched device) considered as a peer-to-peer network. All transmitted information to network are visible only for device that use security scanning of a source. Experimental results show that the distributed architecture is significantly upgradeable in respect to centralized approach.Keywords: network, intrusion detection system, peer to peer, internal and external network
Procedia PDF Downloads 5479368 ECG Based Reliable User Identification Using Deep Learning
Authors: R. N. Begum, Ambalika Sharma, G. K. Singh
Abstract:
Identity theft has serious ramifications beyond data and personal information loss. This necessitates the implementation of robust and efficient user identification systems. Therefore, automatic biometric recognition systems are the need of the hour, and ECG-based systems are unquestionably the best choice due to their appealing inherent characteristics. The CNNs are the recent state-of-the-art techniques for ECG-based user identification systems. However, the results obtained are significantly below standards, and the situation worsens as the number of users and types of heartbeats in the dataset grows. As a result, this study proposes a highly accurate and resilient ECG-based person identification system using CNN's dense learning framework. The proposed research explores explicitly the calibre of dense CNNs in the field of ECG-based human recognition. The study tests four different configurations of dense CNN which are trained on a dataset of recordings collected from eight popular ECG databases. With the highest FAR of 0.04 percent and the highest FRR of 5%, the best performing network achieved an identification accuracy of 99.94 percent. The best network is also tested with various train/test split ratios. The findings show that DenseNets are not only extremely reliable but also highly efficient. Thus, they might also be implemented in real-time ECG-based human recognition systems.Keywords: Biometrics, Dense Networks, Identification Rate, Train/Test split ratio
Procedia PDF Downloads 1609367 An Architectural Model of Multi-Agent Systems for Student Evaluation in Collaborative Game Software
Authors: Monica Hoeldtke Pietruchinski, Andrey Ricardo Pimentel
Abstract:
The teaching of computer programming for beginners has been presented to the community as a not simple or trivial task. Several methodologies and research tools have been developed; however, the problem still remains. This paper aims to present multi-agent system architecture to be incorporated to the educational collaborative game software for teaching programming that monitors, evaluates and encourages collaboration by the participants. A literature review has been made on the concepts of Collaborative Learning, Multi-agents systems, collaborative games and techniques to teach programming using these concepts simultaneously.Keywords: architecture of multi-agent systems, collaborative evaluation, collaboration assessment, gamifying educational software
Procedia PDF Downloads 4639366 Survey of Intrusion Detection Systems and Their Assessment of the Internet of Things
Authors: James Kaweesa
Abstract:
The Internet of Things (IoT) has become a critical component of modern technology, enabling the connection of numerous devices to the internet. The interconnected nature of IoT devices, along with their heterogeneous and resource-constrained nature, makes them vulnerable to various types of attacks, such as malware, denial-of-service attacks, and network scanning. Intrusion Detection Systems (IDSs) are a key mechanism for protecting IoT networks and from attacks by identifying and alerting administrators to suspicious activities. In this review, the paper will discuss the different types of IDSs available for IoT systems and evaluate their effectiveness in detecting and preventing attacks. Also, examine the various evaluation methods used to assess the performance of IDSs and the challenges associated with evaluating them in IoT environments. The review will highlight the need for effective and efficient IDSs that can cope with the unique characteristics of IoT networks, including their heterogeneity, dynamic topology, and resource constraints. The paper will conclude by indicating where further research is needed to develop IDSs that can address these challenges and effectively protect IoT systems from cyber threats.Keywords: cyber-threats, iot, intrusion detection system, networks
Procedia PDF Downloads 809365 Space Time Adaptive Algorithm in Bi-Static Passive Radar Systems for Clutter Mitigation
Authors: D. Venu, N. V. Koteswara Rao
Abstract:
Space – time adaptive processing (STAP) is an effective tool for detecting a moving target in spaceborne or airborne radar systems. Since airborne passive radar systems utilize broadcast, navigation and excellent communication signals to perform various surveillance tasks and also has attracted significant interest from the distinct past, therefore the need of the hour is to have cost effective systems as compared to conventional active radar systems. Moreover, requirements of small number of secondary samples for effective clutter suppression in bi-static passive radar offer abundant illuminator resources for passive surveillance radar systems. This paper presents a framework for incorporating knowledge sources directly in the space-time beam former of airborne adaptive radars. STAP algorithm for clutter mitigation for passive bi-static radar has better quantitation of the reduction in sample size thereby amalgamating the earlier data bank with existing radar data sets. Also, we proposed a novel method to estimate the clutter matrix and perform STAP for efficient clutter suppression based on small sample size. Furthermore, the effectiveness of the proposed algorithm is verified using MATLAB simulations in order to validate STAP algorithm for passive bi-static radar. In conclusion, this study highlights the importance for various applications which augments traditional active radars using cost-effective measures.Keywords: bistatic radar, clutter, covariance matrix passive radar, STAP
Procedia PDF Downloads 2949364 Application of Imperialist Competitive Algorithm for Optimal Location and Sizing of Static Compensator Considering Voltage Profile
Authors: Vahid Rashtchi, Ashkan Pirooz
Abstract:
This paper applies the Imperialist Competitive Algorithm (ICA) to find the optimal place and size of Static Compensator (STATCOM) in power systems. The output of the algorithm is a two dimensional array which indicates the best bus number and STATCOM's optimal size that minimizes all bus voltage deviations from their nominal value. Simulations are performed on IEEE 5, 14, and 30 bus test systems. Also some comparisons have been done between ICA and the famous Particle Swarm Optimization (PSO) algorithm. Results show that how this method can be considered as one of the most precise evolutionary methods for the use of optimum compensator placement in electrical grids.Keywords: evolutionary computation, imperialist competitive algorithm, power systems compensation, static compensators, voltage profile
Procedia PDF Downloads 6059363 Stability and Boundedness Theorems of Solutions of Certain Systems of Differential Equations
Authors: Adetunji A. Adeyanju., Mathew O. Omeike, Johnson O. Adeniran, Biodun S. Badmus
Abstract:
In this paper, we discuss certain conditions for uniform asymptotic stability and uniform ultimate boundedness of solutions to some systems of Aizermann-type of differential equations by means of second method of Lyapunov. In achieving our goal, some Lyapunov functions are constructed to serve as basic tools. The stability results in this paper, extend some stability results for some Aizermann-type of differential equations found in literature. Also, we prove some results on uniform boundedness and uniform ultimate boundedness of solutions of systems of equations study.Keywords: Aizermann, boundedness, first order, Lyapunov function, stability
Procedia PDF Downloads 849362 Comparison of the Chest X-Ray and Computerized Tomography Scans Requested from the Emergency Department
Authors: Sahabettin Mete, Abdullah C. Hocagil, Hilal Hocagil, Volkan Ulker, Hasan C. Taskin
Abstract:
Objectives and Goals: An emergency department is a place where people can come for a multitude of reasons 24 hours a day. As it is an easy, accessible place, thanks to self-sacrificing people who work in emergency departments. But the workload and overcrowding of emergency departments are increasing day by day. Under these circumstances, it is important to choose a quick, easily accessible and effective test for diagnosis. This results in laboratory and imaging tests being more than 40% of all emergency department costs. Despite all of the technological advances in imaging methods and available computerized tomography (CT), chest X-ray, the older imaging method, has not lost its appeal and effectiveness for nearly all emergency physicians. Progress in imaging methods are very convenient, but physicians should consider the radiation dose, cost, and effectiveness, as well as imaging methods to be carefully selected and used. The aim of the study was to investigate the effectiveness of chest X-ray in immediate diagnosis against the advancing technology by comparing chest X-ray and chest CT scan results of the patients in the emergency department. Methods: Patients who applied to Bulent Ecevit University Faculty of Medicine’s emergency department were investigated retrospectively in between 1 September 2014 and 28 February 2015. Data were obtained via MIAMED (Clear Canvas Image Server v6.2, Toronto, Canada), information management system which patients’ files are saved electronically in the clinic, and were retrospectively scanned. The study included 199 patients who were 18 or older, had both chest X-ray and chest CT imaging. Chest X-ray images were evaluated by the emergency medicine senior assistant in the emergency department, and the findings were saved to the study form. CT findings were obtained from already reported data by radiology department in the clinic. Chest X-ray was evaluated with seven questions in terms of technique and dose adequacy. Patients’ age, gender, application complaints, comorbid diseases, vital signs, physical examination findings, diagnosis, chest X-ray findings and chest CT findings were evaluated. Data saved and statistical analyses have made via using SPSS 19.0 for Windows. And the value of p < 0.05 were accepted statistically significant. Results: 199 patients were included in the study. In 38,2% (n=76) of all patients were diagnosed with pneumonia and it was the most common diagnosis. The chest X-ray imaging technique was appropriate in patients with the rate of 31% (n=62) of all patients. There was not any statistically significant difference (p > 0.05) between both imaging methods (chest X-ray and chest CT) in terms of determining the rates of displacement of the trachea, pneumothorax, parenchymal consolidation, increased cardiothoracic ratio, lymphadenopathy, diaphragmatic hernia, free air levels in the abdomen (in sections including the image), pleural thickening, parenchymal cyst, parenchymal mass, parenchymal cavity, parenchymal atelectasis and bone fractures. Conclusions: When imaging findings, showing cases that needed to be quickly diagnosed, were investigated, chest X-ray and chest CT findings were matched at a high rate in patients with an appropriate imaging technique. However, chest X-rays, evaluated in the emergency department, were frequently taken with an inappropriate technique.Keywords: chest x-ray, chest computerized tomography, chest imaging, emergency department
Procedia PDF Downloads 1929361 Firesetting in a Male Prison; An Investigation into the Personality Differences in Firesetters and Non-firesetters
Authors: Elinor Bull, Faye Horsley
Abstract:
Abstract Objective: The current study investigated if there was a difference in personality factors in prisoners who had a recorded history of firesetting and who had no recorded history of firesetting. Participants: Participants were 64 male prisoners in a Category B male prison. Participants who had set a fire were identified through the prisons data base, and prisoners who had not set a fire were selected at random. Method: The study used the International Personality Item Pool-50 to measure personality factors, and prisoners who had set a fire were identified through a range of sources accessible to the prison. Analytical evaluation was done by the Multivariate Kruskal Wallis and Mann-Whitney tests. Findings: There was a significant difference between the the firesetting and non-firesetting group in the scores of the personality factor of Contentiousness. Contentiousness was significantly lower in the firesetting sample compared to the non-firesetting sample. Conclusions: Implications for clinical practice and future research are discussed.Keywords: firesetting, personality, arson, prison, prisoners
Procedia PDF Downloads 829360 Remote Building: An Integrated Approach to Domestic Rainwater Harvesting System Implementation in a Rural Village in Himachal Pradesh, India
Authors: Medha Iyer, Anshul Paul, Aunnesha Bhowmick, Anahita Banerjee, Sana Prasad, Anoushka Singal, Lauren Sinopoli, Pooja Bapat, Shivi Jain
Abstract:
In Himachal Pradesh, India, a majority of the population lives in rural villages spread throughout its hilly regions; many of these households rely on subsistence farming as their main source of livelihood. The student-run non-profit organization affiliated with this study, Project RISHI (Rural India Social and Health Improvement), works to promote sustainable development practices in Bharog Baneri, a gram panchayat, or union, of villages in Himachal Pradesh. In 2017, an established rainwater harvesting (RWH) project group within Project RISHI had surveyed many families, finding that the most common issue regarding food and water access was a lack of accessible water sources for agricultural use in the dry season. After a prototype build in 2018, the group built 6 systems for eligible residents that demonstrated need in 2019. Subsequently, the project went through an evaluation period, including self-evaluation of project goals and post-impact surveying of system recipients. The group used the social impact assessment model to optimize the implementation of domestic RWH systems in Bharog Baneri. Assessing implementation after in-person builds produced three pillars of focus — system design, equitable recipient selection, and community involvement. After two years of remote involvement during COVID-19, the group prepared to visit Bharog Baneri to build 10 new systems in the Summer 2022. First, the group created a more durable and cost-effective design that could withstand debris and heavy rains to prevent gutter failure. The domestic system design is a rooftop RWH catchment system with two tanks attached, an overflow pipe, debris filtration, and a spigot for accessibility. The group also developed a needs-based eligibility methodology with assistance from village leaders and surveying in Bharog Baneri and set up the groundwork for a future community board. COVID-19 has strengthened remote work, telecommunications, and other organizational support systems. As sustainable development evolves to encompass these practices in a post-pandemic world, the potential for new RWH system design and implementation processes has emerged as well. This raises the question: how can a social impact assessment of rural RWH projects inform an integrated approach to post-pandemic RWH system practices? The objective of this exploratory study is to investigate and evaluate a novel remote build infrastructure that brings access to reliable and sustainable sources of water for agricultural use. To construct the remote build approach, the group identified and assigned a point of contact who was experienced with previous RWH system builds. The recipients were selected based on demonstrated need and ease of building. The contact visited each of the houses and coordinated supplier relations and transportation of the materials in accordance with the participatory approach to sustainable development. Over the course of two months, the group completed four system builds with the resulting infrastructure. The infrastructure adhered to the social impact assessment model by centering supplier relations, material transportation, and construction logistics within the community. The conclusion of this exploration is that post-pandemic rural RWH practices should be rooted in strengthening villager communication and utilizing local assets. Through this, non-profit organizations can incorporate remote build strategies into their long-term goals.Keywords: capturing run-off from rooftops, domestic rainwater harvesting, Implementation approaches and strategies, rainwater harvesting and management in rural sectors
Procedia PDF Downloads 879359 Comparing the Durability of Saudi Silica Sands for Use in Foundry Processing
Authors: Mahdi Alsagour, Sam Ramrattan
Abstract:
This paper was developed to investigate two types of sands from the Kingdom of Saudi Arabia (KSA) for potential use in the global metal casting industry. Four types of sands were selected for study, two of the sand systems investigated are natural sands from the KSA. The third sand sample is a heat processed synthetic sand and the last sample is commercially available US silica sand that is used as a control in the study. The purpose of this study is to define the durability of the four sand systems selected for foundry usage. Additionally, chemical analysis of the sand systems is presented before and after elevated temperature exposure. Results show that Saudi silica sands are durable and can be used in foundry processing.Keywords: alternative molding media, foundry sand, reclamation, silica sand, specialty sand
Procedia PDF Downloads 1379358 Meanings and Concepts of Standardization in Systems Medicine
Authors: Imme Petersen, Wiebke Sick, Regine Kollek
Abstract:
In systems medicine, high-throughput technologies produce large amounts of data on different biological and pathological processes, including (disturbed) gene expressions, metabolic pathways and signaling. The large volume of data of different types, stored in separate databases and often located at different geographical sites have posed new challenges regarding data handling and processing. Tools based on bioinformatics have been developed to resolve the upcoming problems of systematizing, standardizing and integrating the various data. However, the heterogeneity of data gathered at different levels of biological complexity is still a major challenge in data analysis. To build multilayer disease modules, large and heterogeneous data of disease-related information (e.g., genotype, phenotype, environmental factors) are correlated. Therefore, a great deal of attention in systems medicine has been put on data standardization, primarily to retrieve and combine large, heterogeneous datasets into standardized and incorporated forms and structures. However, this data-centred concept of standardization in systems medicine is contrary to the debate in science and technology studies (STS) on standardization that rather emphasizes the dynamics, contexts and negotiations of standard operating procedures. Based on empirical work on research consortia that explore the molecular profile of diseases to establish systems medical approaches in the clinic in Germany, we trace how standardized data are processed and shaped by bioinformatics tools, how scientists using such data in research perceive such standard operating procedures and which consequences for knowledge production (e.g. modeling) arise from it. Hence, different concepts and meanings of standardization are explored to get a deeper insight into standard operating procedures not only in systems medicine, but also beyond.Keywords: data, science and technology studies (STS), standardization, systems medicine
Procedia PDF Downloads 3419357 The Rail Traffic Management with Usage of C-OTDR Monitoring Systems
Authors: Andrey V. Timofeev, Dmitry V. Egorov
Abstract:
This paper presents development results of usage of C-OTDR monitoring systems for rail traffic management. The C-OTDR method is based on vibrosensitive properties of optical fibers. Analysis of Rayleigh backscattering radiation parameters changes which take place due to microscopic seismoacoustic impacts on the optical fiber allows to determine seismoacoustic emission source positions and to identify their types. This approach proved successful for rail traffic management (moving block system, weigh- in-motion system etc).Keywords: C-OTDR systems, moving block-sections, rail traffic management, Rayleigh backscattering, weigh-in-motion
Procedia PDF Downloads 5849356 Feasibility Study on Developing and Enhancing of Flood Forecasting and Warning Systems in Thailand
Authors: Sitarrine Thongpussawal, Dasarath Jayasuriya, Thanaroj Woraratprasert, Sakawtree Prajamwong
Abstract:
Thailand grapples with recurrent floods causing substantial repercussions on its economy, society, and environment. In 2021, the economic toll of these floods amounted to an estimated 53,282 million baht, primarily impacting the agricultural sector. The existing flood monitoring system in Thailand suffers from inaccuracies and insufficient information, resulting in delayed warnings and ineffective communication to the public. The Office of the National Water Resources (OWNR) is tasked with developing and integrating data and information systems for efficient water resources management, yet faces challenges in monitoring accuracy, forecasting, and timely warnings. This study endeavors to evaluate the viability of enhancing Thailand's Flood Forecasting and Warning (FFW) systems. Additionally, it aims to formulate a comprehensive work package grounded in international best practices to enhance the country's FFW systems. Employing qualitative research methodologies, the study conducted in-depth interviews and focus groups with pertinent agencies. Data analysis involved techniques like note-taking and document analysis. The study substantiates the feasibility of developing and enhancing FFW systems in Thailand. Implementation of international best practices can augment the precision of flood forecasting and warning systems, empowering local agencies and residents in high-risk areas to prepare proactively, thereby minimizing the adverse impact of floods on lives and property. This research underscores that Thailand can feasibly advance its FFW systems by adopting international best practices, enhancing accuracy, and improving preparedness. Consequently, the study enriches the theoretical understanding of flood forecasting and warning systems and furnishes valuable recommendations for their enhancement in Thailand.Keywords: flooding, forecasting, warning, monitoring, communication, Thailand
Procedia PDF Downloads 619355 Steady Conjugate Heat Transfer of Two Connected Thermal Systems
Authors: Mohamed El-Sayed Mosaad
Abstract:
An analytic approach is obtained for the steady heat transfer problem of two fluid systems, in thermal communication via heat conduction across a solid wall separating them. The two free convection layers created on wall sides are assumed to be in parallel flow. Fluid-solid interface temperature on wall sides is not prescribed in analysis in advance; rather, determined from conjugate solution among other unknown parameters. The analysis highlights the main conjugation parameters controlling thermal interaction process of involved heat transfer modes. Heat transfer results of engineering importance are obtained.Keywords: conjugate heat transfer, boundary layer, convection, thermal systems
Procedia PDF Downloads 3799354 Ag (I) Catalyzed Domino Carbonyl and Alkyne Activation: A Smooth Entry to 2, 2′-Di-Substituted 3, 3′-Bisindolylarylmethanes
Authors: Swastik Karmakar, Prasanta Das, Shital K. Chattopadhyay
Abstract:
An efficient synthesis of symmetrical 2, 2′-Di-substituted 3, 3′-bisindolylarylmethanes (BIAMs) having different aryl and hetero-aryl moieties has been developed by Ag(I)-catalyzed indolyzation and a sequential deoxygenative addition involving o-alkynylanilines and aryl/hetero-aryl aldehydes as substrates. Alkyne and carbonyl units could be activated by Ag (I) simultaneously which results in a domino 5-endo-dig indole annulation, addition of C3 of this indole nucleus to the carbonyl carbon in addition to second indole annulation, and its dehydroxylative addition to the same carbonyl carbon to furnish BIAMs in excellent yield. As 3, 3′-bisindolylmethanes (BIMs) are biologically significant scaffolds, this moiety with further substitutions at the indole core could find some important use in medicinal chemistry. The methodology developed is atom-economic and involves more accessible silver salts, which could be useful for large-scale synthesis.Keywords: alkyne, 3, 3′-Bisindolylarylmethanes, carbonyl, domino, 5-endo-dig indole annulation, silver catalyst
Procedia PDF Downloads 2099353 Genetic Algorithms Based ACPS Safety
Authors: Emine Laarouchi, Daniela Cancila, Laurent Soulier, Hakima Chaouchi
Abstract:
Cyber-Physical Systems as drones proved their efficiency for supporting emergency applications. For these particular applications, travel time and autonomous navigation algorithms are of paramount importance, especially when missions are performed in urban environments with high obstacle density. In this context, however, safety properties are not properly addressed. Our ambition is to optimize the system safety level under autonomous navigation systems, by preserving performance of the CPS. At this aim, we introduce genetic algorithms in the autonomous navigation process of the drone to better infer its trajectory considering the possible obstacles. We first model the wished safety requirements through a cost function and then seek to optimize it though genetics algorithms (GA). The main advantage in the use of GA is to consider different parameters together, for example, the level of battery for navigation system selection. Our tests show that the GA introduction in the autonomous navigation systems minimize the risk of safety lossless. Finally, although our simulation has been tested for autonomous drones, our approach and results could be extended for other autonomous navigation systems such as autonomous cars, robots, etc.Keywords: safety, unmanned aerial vehicles , CPS, ACPS, drones, path planning, genetic algorithms
Procedia PDF Downloads 1819352 DURAFILE: A Collaborative Tool for Preserving Digital Media Files
Authors: Santiago Macho, Miquel Montaner, Raivo Ruusalepp, Ferran Candela, Xavier Tarres, Rando Rostok
Abstract:
During our lives, we generate a lot of personal information such as photos, music, text documents and videos that link us with our past. This data that used to be tangible is now digital information stored in our computers, which implies a software dependence to make them accessible in the future. Technology, however, constantly evolves and goes through regular shifts, quickly rendering various file formats obsolete. The need for accessing data in the future affects not only personal users but also organizations. In a digital environment, a reliable preservation plan and the ability to adapt to fast changing technology are essential for maintaining data collections in the long term. We present in this paper the European FP7 project called DURAFILE that provides the technology to preserve media files for personal users and organizations while maintaining their quality.Keywords: artificial intelligence, digital preservation, social search, digital preservation plans
Procedia PDF Downloads 4459351 A New Protocol Ensuring Users' Privacy in Pervasive Environment
Authors: Mohammed Nadir Djedid, Abdallah Chouarfia
Abstract:
Transparency of the system and its integration into the natural environment of the user are some of the important features of pervasive computing. But these characteristics that are considered as the strongest points of pervasive systems are also their weak points in terms of the user’s privacy. The privacy in pervasive systems involves more than the confidentiality of communications and concealing the identity of virtual users. The physical presence and behavior of the user in the pervasive space cannot be completely hidden and can reveal the secret of his/her identity and affect his/her privacy. This paper shows that the application of major techniques for protecting the user’s privacy still insufficient. A new solution named Shadow Protocol is proposed, which allows the users to authenticate and interact with the surrounding devices within an ubiquitous computing environment while preserving their privacy.Keywords: pervasive systems, identification, authentication, privacy
Procedia PDF Downloads 4829350 Using Soft Systems Methodology in the Healthcare Industry of Mauritius
Authors: Arun Kumar, Neelesh Haulder
Abstract:
This paper identifies and resolves some key issues relating to a specific aspect within the supply chain logistics of the public health care industry in the Republic of Mauritius. The analysis and the proposed solution are performed using soft systems methodology (SSM). Through the application of this relevant systematic approach at problem solving, the aim is to obtain an in-depth analysis of the problem, incorporating every possible world view of the problem and consequently to obtain a well explored solution aimed at implementing relevant changes within the current supply chain logistics of the health care industry, with the purpose of tackling the key identified issues.Keywords: soft systems methodology, CATWOE, healthcare, logistics
Procedia PDF Downloads 515